advertisement
advertisement

Trying A Bit Too Hard To Convince People That Contactless Is Secure

Written by Evan Schuman
March 14th, 2008

One of the non-intuitive truths about marketing is that marketers love to suggest the opposite of what they know to be true. A small startup team will want to reference their global sales offices to make them sound bigger, something that a Microsoft or Wal-Mart would never feel the need to do. Or the product manager for a product that is slower than any of its rivals will want to push that it’s 26 percent faster than its older version.

The small player wants to suggest that it’s big, mostly because it knows it’s not and the slow player wants to suggest that it’s fast, for the same reason. Knowing this, it’s easy to look at advertisements and news releases and figure out where that company believes it is weakest. As the Bard said, "The lady doth protest too much, methinks."

I bring this up because of the stories this week involving some Univ. of Virginia graduate students were able to steal encryption coding and create fake contactless entry cards. Here’s a video of the students explaining their findings with a nice demo.

The Smart Card Alliance quickly issued a statement that lead with: "A recent Associated Press story and subsequent news reports contained an important error and the Smart Card Alliance wants to correct the record. The stories inaccurately linked security questions raised by a University of Virginia graduate student about an RF-enabled chip used primarily in transit applications with the contactless smart card technology used in financial payment cards. The RF-enabled chip used in the U.Va. research is not the same product used in contactless credit/debit cards and electronic passports."

While I try and overpower my desire to nitpick their clarification, the issue is that the reports pointed out that the contactless capabilities in the access cards that were cloned also exists in contactless credit cards, among other places. The stories didn’t say that it was the same manufacturer or imply that.

But at the big-picture level, the stories were essentially saying, "The convenience of contactless comes with potential security problems and these are other places where contactless is being used." By rushing in to deny that that particular chip is in contactless cards, it actually raises the issue in consumers’ minds.

More importantly, it certainly signals that the contactless industry must think it’s in a weak security position to feel the need to issue such a statement. This is also a dangerous path because it’s inching toward the position that contactless cards are safe, that they’re not vulnerable to attack.

The reasonable argument is, "Anything can and will be cracked and certainly contactless cards are no exception. That said, they’re not significantly less secure than their magstripe parents and they sure are more convenient and versatile."

Contactless cards have had their share of problems recently. But you don’t address security concerns by pretending they don’t exist. You acknowledge that everything is relative and that weaknesses are there but there are advantages, too.

I personally don’t see contactless cards as especially not secure, given the huge fraud rates with magstripe cards. But given the statement issued this statement, I think it’s clear that the Smart Card Alliance is apparently a lot more worried about it. And it shows.


advertisement

3 Comments | Read Trying A Bit Too Hard To Convince People That Contactless Is Secure

  1. Sid Sidner Says:

    The difference is subtle but very important right now.

    The U.S. Federal gov’t is going ahead with using RFID style contactless cards instead of smart card contactless cards for security IDs. This alarms everyone in the industry. The Smart Card Alliance has been doing yeoman duty trying to get this changed, including testify before Congress and committees. (Disclaimer: my company, like most of the companies in the payment card business, are members of the SCA.)

    While the radio may be contactless in both, an RFID card is passive while a smart card is active, with a little computer and active cryptography. Granted, the current “mag stripe contactless” protocol used in the U.S. is not as strong as EMV Chip and PIN with dynamic codes, it is still stronger than RFID.

    The PIV II cards used in U.S. government identity systems now is an example of the right way to do it. Unfortunately, so of the Homeland Security border initiatives are using RFID, instead. The SCA Web site has excellent factual material on this.

    In summary, painting all contractless cards with the same security brush is a mistake.

    – Sid

  2. A Reader Says:

    While smart cards are certainly far more secure than RFID tags, which are nothing more than radio frequency bar codes, all contactless devices offer the potential risk of undesirable and unforeseen side effects.

    Researchers have shown that the mere existence of a contactless card (such as the new U.S. passport) can be recognized by hostile persons. An overly-dramatic video demonstrates this with a fake bomb detonated by a passport-carrying dummy passing by. The official U.S. government passport cover wisely incorporates a Faraday cage, but the demo was performed with the card held open by no more than an inch.

    A demonstration video also showed how an attacker with a laptop in a briefcase was able to briefly sit down next to a man on a bench, read the Shell Speedpass token in his pocket, then returned the data to their office and broke the cryptography. They then took their laptop to a Shell station and used their computer driven RF device to purchase gas on the victim’s account.

    Distance is no cure. Published maximum distances that accompany commercial tags and readers are useful for antenna placement to assure high reliability reading, but are not actual physical limits. RFID tags with published ranges of tens of centimeters were read by DEFCON attendees at a distance of over 69 feet.

    Contact smart card readers may require much more frequent maintenance, but contact-based cards cannot be surreptitiously read without the cooperation of the cardholder unless a physical theft takes place.

    Any device that can be invisibly read at even a small distance without the consent of the owner of the device can be misused. We may not know the forms of the attacks that will be mounted tomorrow, but we can be assured that they will be attacked.

  3. Hates Contactless Says:

    Just exactly what is wrong using with “contact-style” smartcards instead of contactless cards? Why is the credit card industry hell-bent on RFID? Is it really so much more time consuming to push a card into a reader than to wave a card near one? The tradeoff in security is about like the difference between getting hit by a car while riding a bicycle (RFID card) vs being inside a truck (contact-style smartcard). Considering all the credit card data that’s being reported stolen almost every day, you would think the credit card industry would be running 180 degrees away from RFID (what part of RADIO in RFID do they not understand???) but for some strange reason they are force-feeding consumers with cards that can be sniffed by anyone within 30 feet instead of moving aggressively to require smartcards, which are virtually fraud-proof, even for eCommerce transactions. Why why why???

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.